Sair 3X0-104 Practice Questions

Page 1

http://www.pass4sureOfficial.com

3X0-104 Sair Linux Security, Privacy and Ethics (Level 1)

Pass4sureofficial.com is a reputable IT certification examination guide, study guides and audio exam provider, we not only ensure that you pass your 3X0-104 exam in first attempt, but also you can get a high score to acquire Sair certification. If you use pass4sureofficial 3X0-104 Certification questions and answers, you will experience actual 3X0-104 exam questions/answers. We know exactly what is needed and have all the exam preparation material required to pass the exam. Our Sair exam prep covers over 95% of the questions and answers that may be appeared in your 3X0-104 exam. Every point from pass4sure 3X0-104 PDF, 3X0-104 review will help you take Sair 3X0-104 exam much easier and become Sair certified. All the Questions/Answers are taken from real exams. Here's what you can expect from the Pass4sureOfficial Sair 3X0-104 course: * Up-to-Date Sair 3X0-104 questions taken from the real exam. * 100% correct Sair 3X0-104 answers you simply can't find in other 3X0-104 courses. * All of our tests are easy to download. Your file will be saved as a 3X0-104 PDF. * Sair 3X0-104 brain dump free content featuring the real 3X0-104 test questions. Sair 3X0-104 certification exam is of core importance both in your Professional life and Sair certification path. With Sair certification you can get a good job easily in the market and get on your path for success. Professionals who passed Sair 3X0-104 exam training are an absolute favorite in the industry. You will pass Sair 3X0-104 certification test and career opportunities will be open for you.


Exam Name: Exam Type Exam Code:

Linux Security, Privacy & Ethics (Level 1) SAIR 3X0-104

Total Questions:

122

Question: 1 Kathryn wants to maximize security on her system by replacing ftpd with a program that logs requests, denies unauthorized users, and runs the original ftpd daemon. What should Kathryn use? A. TCP wrappers B. A VPN C. Tripwire D. Packet filters Answer: A Question: 2 John has just set up shadowing on his Linux machine. As root, he looks in the /etc/shadow file and finds the line below. Which of the following is TRUE about the line he found? jsmith:H7o12v$s:100:0:60:7:3:: A. The user jsmith's account has been disabled for 100 minutes. B. The user jsmith's password can only be changed after the current password has been active for 3 days. C. The user jsmith will be warned for 60 days until his password expires. D. The user jsmith's account will be disabled 3 days after his password expires. Answer: D Question: 3 John would like the finger daemon to be TCP wrapped. He finds the line below in the /etc/inetd.conf file. How should he change this line to enable wrapping of the finger daemon? finger stream tcp nowait nobody /usr/sbin/in.fingerd A. finger stream tcpd nowait /usr/sbin/in.fingerd B. finger stream tcp nowait /usr/sbin/tcpd in.fingerd C. finger stream tcpd nowait /usr/sbin/tcpd finger D. finger stream tcp nowait /usr/sbin/in.fingerd in.fingerd Answer: B Question: 4 Which of the following can be used to watch logged-in users as they execute commands? A. ttysnoop B. mgetty C. sniffdev D. urlsniff Answer: A Question: 5 Which of the following best describes how the Crack program breaks passwords? A. It gathers passwords by masquerading as a Kerberalized login program. B. It encrypts a list of dictionary words and compares it to passwords already encrypted on the system. C. It attempts to decrypt passwords that are already encrypted on the system.

Page 1 of 31


Exam Name: Exam Type Exam Code:

Linux Security, Privacy & Ethics (Level 1) SAIR 3X0-104

Total Questions:

122

D. It gathers plain-text information sent over the network and parses that information for passwords. Answer: B Question: 6 The following is a listing from the /etc/passwd file. Which users have a user identification (UID) of superuser? johndoe:x:1:0::/home/johndoe:/bin/bash tom:x:0:0::/home/tom:/bin/bash beth:x:0:1::/home/beth:/bin/bash carla:x:1:1::/home/carla:/bin/bash A. johndoe and carla B. tom and beth C. johndoe and tom D. beth and carla Answer: B Question: 7 Charles has been using PGP for file encryption for months and wants to expand its uses to other projects. Which of the following would NOT be an effective use of PGP? A. Creating public keys for user authentication B. Encrypting company e-mail C. Creating digital signatures D. Encrypting the signing of SSL certificates E. Creating private keys for user authentication Answer: D Question: 8 Molly wants to encrypt and send an e-mail containing sensitive material to Sandy. To ensure that no one besides Sandy can read the e-mail, Molly wants to use PGP encryption. Which of the following methods will allow Molly to encrypt the e-mail and provide a way for Sandy to decrypt it? (Choose two.) A. Molly gives a password at encryption time that Sandy can use to decrypt the e-mail. B. Molly encrypts the e-mail using a private key. Sandy must then decrypt it using the public key. C. Molly encrypts the e-mail using a public key. Sandy must then decrypt it using the private key. D. Molly encrypts the e-mail using a series of private keys. Sandy then decrypts it using one of the private keys sent along with the e-mail. Answer: A, C Question: 9 A cracker has obtained the /etc/passwd file from a large Server . In an attempt to gain entry into the system, the cracker checks the encrypted passwords from /etc/passwd against a list of encrypted passwords created from a word list. This is an example of a ________ attack. A. dictionary Page 2 of 31


Exam Name: Exam Type Exam Code:

Linux Security, Privacy & Ethics (Level 1) SAIR 3X0-104

Total Questions:

122

B. buffer overflow C. brute force D. smurf E. spoof Answer: A Question: 10 An assistant network administrator has just been assigned the task of enhancing network security. One of the options that he has to implement is password aging. Consider the excerpt below from the /etc/passwd file. Which two commands can the network administrator run to make jdoe's and msmith's passwords expire in 90 days? (Choose two.) A. passwd -90 jdoe msmith B. passwd -x 90 jdoe msmith C. passwd --expire 90 jdoe msmith D. crypt -m 90 jdoe msmith E. chage -m 90 jdoe msmith Answer: B, E Question: 11 An assistant network administrator has just been assigned the task of enhancing network security. One of the options to be implemented is password aging. Consider the excerpt from the /etc/passwd file below. Which of the following would implement password aging? A. shadow -x 90 jdoe msmith B. pwconv; passwd -x 90 jdoe msmith C. crypt; passwd -age 90 jdoe msmith D. pwage -t 90 jdoe msmith Answer: B Question: 12 Tom, a system administrator for Server A, is interested in security and has written a script that scans the password file for unauthorized promotion to root status. Which of the following should the script check? (Choose two.) A. A UID number that has been set to one B. A UID number that has been set to zero C. An account with the GID set to * D. A user with a non-standard shell (i.e., "/bin/runasroot") E. An account with the UID set to * Answer: B, D Question: 13 The line below is from an /etc/passwd file. What information does the presence of a single character in the second field (an x in most cases) reveal about the password authentication procedure? john:x:500:100::/home/john:/bin/bash A. Encoded passwords are stored in "/etc/shadow." B. The administrator has locked this user's account. C. The user's encrypted password is x. Page 3 of 31


Pass4SureOfficial.com Lifetime Membership Features; -

Pass4SureOfficial Lifetime Membership Package includes over 2300 Exams. All exams Questions and Answers are included in package. All Audio Guides are included free in package. All Study Guides are included free in package. Lifetime login access. Unlimited download, no account expiry, no hidden charges, just one time $99 payment. Free updates for Lifetime. Free Download Access to All new exams added in future. Accurate answers with explanations (If applicable). Verified answers researched by industry experts. Study Material updated on regular basis. Questions, Answers and Study Guides are downloadable in PDF format. Audio Exams are downloadable in MP3 format. No authorization code required to open exam. Portable anywhere. 100% success Guarantee. Fast, helpful support 24x7.

View list of All exams (Q&A) downloads http://www.pass4sureofficial.com/allexams.asp View list of All Study Guides (SG) downloads http://www.pass4sureofficial.com/study-guides.asp View list of All Audio Exams (AE) downloads http://www.pass4sureofficial.com/audio-exams.asp Download All Exams Samples http://www.pass4sureofficial.com/samples.asp To purchase $99 Lifetime Full Access Membership click here http://www.pass4sureofficial.com/purchase.asp 3COM ADOBE APC Apple BEA BICSI CheckPoint Cisco Citrix CIW

CompTIA ComputerAssociates CWNP DELL ECCouncil EMC Enterasys ExamExpress Exin ExtremeNetworks

Filemaker Fortinet Foundry Fujitsu GuidanceSoftware HDI Hitachi HP Huawei Hyperion

IBM IISFA Intel ISACA ISC2 ISEB ISM Juniper Legato Lotus

LPI McAfee McData Microsoft Mile2 NetworkAppliance Network-General Nokia Nortel Novell

OMG Oracle PMI Polycom RedHat Sair SASInstitute SCP See-Beyond SNIA

Sun Sybase Symantec TeraData TIA Tibco TruSecure Veritas Vmware


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.